Main Page

From The Secure Arc Wiki

(Difference between revisions)
Jump to: navigation, search
(Just restructured and cleaned up a bit)
m (Made a minor modification to the plurality of our clients)
Line 4: Line 4:
All stages can involve some form of [[Information_Asset_Classification|Information Asset Classification,]] [[Threat_Model|Threat Modeling]] and [[Architectural_Decisions|Risk Assessment.]]
All stages can involve some form of [[Information_Asset_Classification|Information Asset Classification,]] [[Threat_Model|Threat Modeling]] and [[Architectural_Decisions|Risk Assessment.]]
-
With our repeatable and adaptable [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] we can provide day 1 guidance to ensure the overall solution architecture is developed in a secure manner and the threats facing a given system are clearly identified and mitigated where practical. Our [[Logical_Security_Zone_Pattern|Trust Model]] has been adopted as the enterprise wide network security architecture for the entire organisation at one of our clients.
+
With our repeatable and adaptable [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] we can provide day 1 guidance to ensure the overall solution architecture is developed in a secure manner and the threats facing a given system are clearly identified and mitigated where practical. Our [[Logical_Security_Zone_Pattern|Trust Model]] has been adopted as the enterprise wide network security architecture for the entire organisation at some of our clients.
This [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] is derived from the same ISO standards that have been adopted and built on across a number of large regional and international corporations.
This [[Secure_Arc_Reference_Architecture|Security Reference Architecture]] is derived from the same ISO standards that have been adopted and built on across a number of large regional and international corporations.

Revision as of 06:27, 30 August 2008

Secure Arc offer Security Architecture consulting services primarily in the Identity Management (IDM) and J2EE space for large enterprises. These services span the entire software development life-cycle, including methodology, infrastructure and software design, deployment guidance and software development.

All stages can involve some form of Information Asset Classification, Threat Modeling and Risk Assessment.

With our repeatable and adaptable Security Reference Architecture we can provide day 1 guidance to ensure the overall solution architecture is developed in a secure manner and the threats facing a given system are clearly identified and mitigated where practical. Our Trust Model has been adopted as the enterprise wide network security architecture for the entire organisation at some of our clients.

This Security Reference Architecture is derived from the same ISO standards that have been adopted and built on across a number of large regional and international corporations.

Personal tools